Sieuwert Van Otterloo

Sieuwert Van Otterloo
Verified
Sieuwert verified their affiliation via an institutional email.
Verified
Sieuwert verified their affiliation via an institutional email.
  • Ph.D.
  • Researcher at University of Applied Sciences Utrecht

IT expert, auditor and researcher in applied Artificial Intelligence

About

28
Publications
9,302
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
259
Citations
Current institution
University of Applied Sciences Utrecht
Current position
  • Researcher
Additional affiliations
April 2017 - present
Vrije Universiteit Amsterdam
Position
  • Senior Lecturer
Description
  • Lecturer for multiple course in the information science, computer science and AI curriculum.

Publications

Publications (28)
Article
Full-text available
This paper introduces a real-world dataset for analysing and predicting house prices. The dataset consists of actual data on the Dutch housing market collected in 2024 for a total of 153 houses in one city (Utrecht in The Netherlands). The dataset incorporates diverse variables on individual houses, includ- ing property characteristics (e.g., house...
Article
Full-text available
Crowdfunding through platforms like Kickstarter is a common way to finance development projects for innovative products. These projects have a risk of failure that is not always communicated clearly to the people providing the money (backers). In this paper data from 35 crowdfunded projects is collected and analysed. It is used to estimate the prob...
Article
Full-text available
Artificial intelligence (AI) is increasingly being used for decision-making. Technological developments have significantly increased the performance of AI models but have also increased their complexity. As a result, IT professionals are struggling to develop fair AI implementations. Using a case study, we demonstrate how both gender and age bias c...
Preprint
Full-text available
This study investigates the public perception of the blame for incidents where existing autonomous vehicles (AVs) make poor decisions when faced with challenging road infrastructure. We particularly focus on whether the road owner may be considered to be at blame for the incident. We found that respondents overwhelmingly blamed the vehicle for the...
Article
Full-text available
This study investigates the public perception of the blame for incidents where existing autonomous vehicles (AVs) make poor decisions when faced with challenging road infrastructure. We particularly focus on whether the road owner may be considered to be at blame for the incident. We found that respondents overwhelmingly blamed the vehicle for the...
Preprint
Full-text available
Ethical AI frameworks are designed to encourage the accountability, responsibility and transparency of AI applications. They provide principles for ethical design. To be truly transparent, it should be clear to the user of the AI application that the designers followed responsible AI principles. In order to test how easy it is for a user to assess...
Article
Full-text available
Ethical AI frameworks are designed to encourage the accountability, responsibility and transparency of AI applications. They provide principles for ethical design. To be truly transparent, it should be clear to the user of the AI application that the designers followed responsible AI principles. In order to test how easy it is for a user to assess...
Article
Full-text available
Game theory has been invented as a model of interaction between self-interested agents, so it ‘ought’
Article
Full-text available
Agents often interact strategically to meet conditions involving their own or other agents' knowledge. This interaction can be modeled using a new method of game construction, knowledge condition games, introduced in this paper. Knowledge condition games are games in which a coalition of agents chooses its strategy in an extensive game form such th...
Conference Paper
Full-text available
Agents often want to protect private information, while at the same acting upon the information. These two desires are in conflict, and this conflict can be modeled in strategic games where the utility not only depends on the expected value of the possible outcomes, but also on the information properties of the strategy an agent uses. In this paper...
Conference Paper
Full-text available
My research is focused on checking multi-agent protocols for their game theoretic properties, using logic and occasionally information theory. The main results involve computational complexity for several classes of properties, such as properties involving knowledge, assuming commonly known strategies, or nested preferences.
Article
Full-text available
ATEL is one of the most expressive logics for reasoning about knowledge, time and strategies. Several issues around the interpretation of this logic are still unresolved. This paper contributes to the ongoing discussion by showing that agents do not have to know a specic strategy for doing something in order to have a capability. Furthermore we cla...
Article
Full-text available
We introduce a Game Logic with Preferences (GLP), which makes it possible to reason about how information or assumptions about the preferences of other players can be used by agents in order to realize their own preferences. GLP can be applied to the analysis of social protocols such as voting or fair division problems; we illustrate this use of GL...
Article
Full-text available
Model checking as an approach to the automatic verification of finite state systems has focused predominantly on system specifications expressed in tem-poral logic. In the distributed systems community, logics of knowledge (epistemic logics) have been advocated for expressing desirable properties of protocols and systems. A range of logics combinin...
Article
Full-text available
this paper. It contains many of the sources that were used to make this text, the PGP program, and some otherwise useful programs. Figure 1: Bruce Schneier's book One of the highlights is the complete text of the Handbook of applied cryptography [13]. This book is a complete introduction to cryptography, and much of what is mentioned in this text c...
Article
Full-text available
this paper. The term evolution strategies was introduced by Rechenberg and Schwefel around 1960 [1]. Evolution strategies are often used to find optima of real-valued functions. Applications were for instance optimization of the shape of a bended pipe or drag minimization of a joint plate. It works mainly by applying changes on a candidate solution...
Article
Full-text available
The ultimate goal of our research is to develop techniques for model checking knowledge properties of multi-agent systems. ATEL, an extension of the Alternating-time Temporal Logic of Alur et al, is a logic for specifying epistemic and strategic properties of such systems. We present a technique for reducing the ATEL model checking problem to one o...
Article
Full-text available
The ultimate goal of our research is to develop techniques for model checking knowledge properties of multi-agent systems. ATEL, an extension of the Alternating-time Temporal Logic of Alur et al, is a logic for specifying epistemic and strategic properties of such systems. We present a technique for reducing the ATEL model checking problem to one o...
Article
Full-text available
We are interested in applying model checking techniques to the verification of communication protocols which require safe communication. Typically, in such scenarios, one desires to demonstrate that one party can reliably communicate information to another party without a third party being able to determine this information. Our approach involves u...
Article
Full-text available
Verification of strategic properties is complicated, even for very small protocols. In this work we look at voting protocols that allow three agents to vote over three alternatives, and investigate what properties of those protocols can be expressed in different logics. We first verify some basic requirements using a logic of coalition powers. Then...
Article
Full-text available
Understanding the flow of knowledge in multi agent protocols is essential when proving the correctness or security of such protocols. Current logical approaches, often based on model check-ing, are well suited for modeling knowledge in systems where agents do not act strategically. Things become more complicated in strategic situations. In this pap...
Article
Game Logic with Preferences (GLP), is a logic that makes it possible to reason about how information or as- sumptions about the preferences of other players can be used by agents in order to realize their own preferences. We extend the work done on this logic by looking at the satisfia- bility problem for this logic. We introduce an axiom system an...
Article
Extensive games of perfect information can be used as a model for multi agent deci-sion making. For instance auctions and voting can be modeled as extensive games. An extension of modal logic called GLP − is defined that allows us to express whether each agent has the appropriate amount of influence in the decision making process. In this paper a c...

Network

Cited By